"Unlock the Secrets of Data Privacy Interviews - You Won't Believe What They Ask!"

Prabh Nair
26 Mar 202326:26

Summary

TLDRIn this session, Prabh Nair discusses common interview questions for data privacy jobs, providing valuable insights and answers based on his experience. He emphasizes understanding privacy, the difference between privacy and secrecy, and key requirements for privacy compliance. Prabh also covers essential steps for GDPR compliance, creating privacy policies, and responding to privacy breaches. This video aims to help viewers prepare for interviews and enhance their knowledge of data privacy practices. For more details, Prabh invites viewers to connect on LinkedIn and subscribe to his YouTube channel for future updates.

Takeaways

  • πŸ˜€ Introduction: Prabh Nair hosts a session on interview questions frequently asked in data privacy jobs.
  • πŸ“š Prabh emphasizes the importance of understanding privacy, explaining that privacy is a state where information is not observed or disturbed by others.
  • πŸ’Ό Privacy vs. Secrecy: Privacy relates to individual information, while secrecy pertains to organizational information.
  • πŸ” Privacy Compliance: The most important requirement is to understand regulatory and business requirements, appoint a data protection officer, create a privacy program, and conduct privacy impact assessments.
  • 🏒 Privacy Program Management: A comprehensive approach to establish, implement, and continually improve an organization's privacy program to ensure compliance with data privacy regulations.
  • πŸ“ Creating a Privacy Policy: Understand business and legal requirements, define scope, types of collected information, sharing policies, retention periods, and include review and exception processes.
  • ⚠️ Responding to Privacy Breaches: Steps include containing the breach, evaluating risks, notifying authorities, and implementing remediation plans.
  • 🌐 GDPR Compliance: High-level steps include updating data consents, implementing transparency documentation, and detailed steps like data mapping, consent management, and privacy policy development.
  • πŸ›‘οΈ Data Privacy Risk Assessment: Steps include defining the scope, identifying personal data, evaluating existing controls, identifying gaps, prioritizing remediation, and monitoring.
  • πŸ‘ Importance of Data Privacy: Protects personal information from unauthorized access, maintains trust, and ensures ethical data use.

Q & A

  • Who is the presenter of the session and what is the primary focus of their YouTube channel?

    -The presenter is Prabh Nair, and the primary focus of his YouTube channel is to provide value to his clients, stakeholders, and subscribers by sharing information, particularly on interview questions related to data privacy jobs.

  • What is the initial question discussed in the session, and what is its significance in an interview context?

    -The initial question discussed is 'Can you tell me about what is privacy?' This question is significant in an interview context as it helps to understand the candidate's thought process and psychology regarding privacy, which is crucial for handling complex privacy solutions.

  • How does Prabh Nair define privacy in his response?

    -Prabh Nair defines privacy as a state of information where one is not observed or disturbed by others. He uses the example of medical records, which should be kept private to avoid misuse by third parties. He also mentions that privacy is considered a fundamental right in some countries.

  • What is the difference between privacy and secrecy as explained by Prabh Nair?

    -Privacy is related to information concerning individuals, such as personal data and medical records. Secrecy, on the other hand, pertains to information related to organizations, such as internal business processes and trade secrets.

  • What are the key steps mentioned by Prabh Nair for ensuring privacy compliance?

    -The key steps for privacy compliance include understanding regulatory and business requirements, appointing a Data Protection Officer, creating a privacy program management system, developing a privacy policy, and conducting Privacy Impact Assessments (PIA).

  • How does Prabh Nair describe the process of Privacy Impact Assessment (PIA)?

    -Prabh Nair describes PIA as a process that involves identifying and assessing privacy risks associated with new projects or changes in existing processes. It helps in understanding what privacy requirements are needed and identifying gaps in the current system.

  • What is the importance of having a Privacy Program Management system?

    -A Privacy Program Management system is important because it is a comprehensive approach to privacy and data protection, helping organizations minimize privacy breaches, address underlying problems, and comply with data privacy regulations effectively.

  • What are some critical steps for GDPR compliance according to Prabh Nair?

    -Critical steps for GDPR compliance include data mapping, developing and implementing privacy policies, managing consents, conducting PIA, establishing data subject rights, ensuring data breach notifications, vendor compliance, training and awareness programs, and appointing Data Protection Officers.

  • How should an organization respond to a privacy breach as per the session?

    -An organization should respond to a privacy breach by first containing the breach, evaluating the associated risks, notifying the necessary parties as per legal requirements, performing remediation, and learning from the incident to prevent future breaches.

  • What are the essential elements of creating a privacy policy?

    -Essential elements of creating a privacy policy include understanding business and legal requirements, defining the scope and statement, including business names and contact information, detailing the type of information collected, specifying data collection procedures, addressing data sharing with third parties, and defining data retention periods. Policies should also be reviewed annually or after major business changes.

Outlines

00:00

β˜• Introduction and Overview

Prabh Nair welcomes viewers to his session, 'Coffee with Prabh,' where he will discuss frequently asked interview questions related to data privacy jobs. He introduces himself, mentions his role as a chief instructor at InfoSecTory, and encourages viewers to subscribe to his YouTube channel for more valuable content. He emphasizes the value he aims to provide to his clients, stakeholders, and subscribers.

05:01

πŸ›‘οΈ Defining Privacy

Prabh explains the concept of privacy in response to a common interview question. He describes privacy as a state of information where an individual is not observed or disturbed by others, using medical records as an example. He highlights the importance of privacy as a fundamental right in some countries, essential for human dignity and the foundation of other human rights. Prabh contrasts privacy with secrecy, explaining that privacy relates to individual information, while secrecy pertains to organizational information.

10:02

πŸ“œ Privacy Compliance Requirements

Prabh discusses the importance of understanding regulations and business requirements for privacy compliance. He uses examples of GDPR, HIPAA, and other regulations to illustrate the need for compliance. He outlines the steps for achieving compliance: understanding requirements, appointing a Data Protection Officer, creating a privacy program management system, drafting a privacy policy, and conducting Privacy Impact Assessments. These steps help organizations maintain privacy protection and comply with legal standards.

15:03

πŸ” Privacy Program Management

Prabh explains privacy program management, comparing it to an Information Security Management System (ISMS). He describes it as a comprehensive approach to managing privacy and data protection, minimizing risks and ensuring compliance with regulations. Key steps include establishing the program, conducting privacy risk assessments, developing a privacy management plan, implementing controls, monitoring effectiveness, and providing training and awareness. This systematic approach helps organizations maintain privacy standards and respond to incidents effectively.

20:05

πŸ” Creating a Privacy Policy

Prabh outlines the process of creating a privacy policy, emphasizing the need to understand business and legal requirements. The policy should define its scope, detail the type of information collected, explain data collection procedures, and specify data retention periods. He highlights the importance of regular reviews and updates to the policy, including documenting exceptions and ensuring compliance through training and awareness. A well-crafted privacy policy is crucial for governance and protecting individual data.

25:06

🚨 Responding to Privacy Breaches

Prabh discusses how to respond to privacy breaches, focusing on containment, risk evaluation, and remediation. He explains the importance of isolating affected systems, assessing the impact, notifying relevant authorities, and developing an incident response plan. Prabh emphasizes the need for a thorough investigation to prevent future breaches and the significance of transparency and communication during a breach. This approach helps organizations manage crises effectively and maintain trust.

πŸ” Understanding Data Privacy

Prabh explains the significance of data privacy in today's world, highlighting the risks of unauthorized access, identity theft, and misuse of personal data. He emphasizes the importance of protecting personal information to maintain trust in institutions and businesses. Prabh outlines the steps for conducting a data privacy risk assessment, including identifying the scope, evaluating existing controls, identifying gaps, and developing an action plan. Effective data privacy practices ensure compliance and protect individuals' rights.

🌐 Steps for GDPR Compliance

Prabh provides a detailed overview of steps required for GDPR compliance. He explains high-level steps such as updating data consents and transparency documentation, as well as detailed steps like data mapping, developing a privacy policy, managing consents, conducting Privacy Impact Assessments, and ensuring vendor compliance. Regular training and the appointment of Data Protection Officers are also crucial. These steps help organizations adhere to GDPR regulations and protect personal data.

πŸ›‘οΈ Data Privacy Risk Assessment Approach

Prabh describes his approach to performing a data privacy risk assessment, emphasizing the importance of identifying the scope and purpose, evaluating existing controls, and identifying gaps. He outlines the process of developing an action plan to address identified risks and the need for ongoing monitoring and review. This structured approach ensures that organizations can effectively manage data privacy risks and comply with applicable regulations.

πŸ“ˆ Conclusion and Call to Action

Prabh concludes the session by inviting feedback and encouraging viewers to share the video if they found it useful. He asks if viewers would like more content on data privacy interview questions and other related topics. Prabh emphasizes the effort put into creating the content and reiterates the value of subscribing to his channel for future updates on similar topics.

Mindmap

Keywords

πŸ’‘Privacy

Privacy is the state of keeping one's personal information protected from being observed or disturbed by others. In the context of the video, privacy is described as a critical element in data protection, where personal data such as medical records should remain confidential to prevent misuse. The discussion emphasizes the psychological aspect of how individuals perceive privacy and its importance as a fundamental right in some countries.

πŸ’‘Secrecy

Secrecy refers to the state of keeping information hidden or undisclosed, usually pertaining to organizational data. The video contrasts secrecy with privacy by explaining that secrecy involves internal business information or trade secrets of a company, whereas privacy deals with personal information of individuals.

πŸ’‘Data Privacy Compliance

Data privacy compliance involves adhering to laws and regulations that govern the protection of personal data. The video highlights the importance of understanding business and legal requirements to ensure compliance with regulations such as GDPR, HIPAA, and others. Compliance ensures that personal data is processed, stored, and shared securely.

πŸ’‘GDPR

The General Data Protection Regulation (GDPR) is a regulation in the European Union that governs data protection and privacy. The video explains the steps required for GDPR compliance, such as updating data consent, implementing transparency documentation, and conducting privacy impact assessments. GDPR compliance is crucial for businesses operating in or serving customers in the EU.

πŸ’‘Data Protection Officer (DPO)

A Data Protection Officer (DPO) is responsible for overseeing data protection strategies and ensuring compliance with data privacy regulations. In the video, the DPO is described as a crucial role that acts as a data steward, mapping business requirements with legal obligations and managing privacy compliance within the organization.

πŸ’‘Privacy Impact Assessment (PIA)

A Privacy Impact Assessment (PIA) is a process used to identify and mitigate privacy risks associated with new projects or changes in existing processes. The video details how a PIA involves evaluating current controls, identifying gaps, and developing action plans to ensure compliance with privacy regulations like GDPR.

πŸ’‘Privacy Program Management

Privacy Program Management is a comprehensive approach to establishing and maintaining data privacy controls within an organization. The video explains that this involves creating policies, implementing controls, and continuously improving processes to minimize privacy breaches and ensure compliance with data protection regulations.

πŸ’‘Personal Data

Personal data refers to any information related to an identified or identifiable individual. The video emphasizes the importance of protecting personal data from unauthorized access and highlights examples such as medical records and PII (Personally Identifiable Information) that need to be kept confidential to prevent misuse.

πŸ’‘Consent Management

Consent management involves obtaining and managing consent from individuals for collecting, processing, and storing their personal data. The video discusses how consent management is critical for compliance with regulations like GDPR, ensuring that individuals are informed and agree to how their data is used.

πŸ’‘Data Breach Response

Data breach response refers to the actions taken to address a data breach, including containing the breach, evaluating risks, notifying affected parties, and implementing remediation measures. The video outlines steps such as isolating affected systems, notifying response teams, and conducting root cause analysis to prevent future incidents.

Highlights

Introduction of the session focused on data privacy interview questions.

Emphasis on providing value to clients, stakeholders, and subscribers.

Explanation of what privacy means and its importance.

Difference between privacy and secrecy.

Key requirements for privacy compliance.

Steps to establish a privacy program management.

Detailed process for building and maintaining a privacy program.

Discussion on handling privacy breaches effectively.

Steps to create a comprehensive privacy policy.

Importance of data privacy in the modern world.

Overview of data privacy risk assessment approach.

Explanation of GDPR compliance steps, both high-level and detailed.

Role and importance of Data Protection Officer (DPO).

Regular review and update of privacy policies to ensure compliance.

Encouragement to share the video and subscribe for future content.

Transcripts

play00:00

hello team welcome to my session on

play00:02

coffee with prabh and today we're going

play00:04

to discuss some interview questions

play00:05

which is frequently asked in our data

play00:07

privacy jobs my name is prabh Nair and

play00:10

for more information you can check my

play00:12

LinkedIn profile these questions I also

play00:15

ask when I basically onboard any

play00:17

consultant for the project so might be

play00:19

this video useful for you

play00:21

and if you're new to the channel do

play00:22

subscribe to my YouTube channel and

play00:24

click on the Bell icon to make sure you

play00:25

should not miss my future videos on a

play00:27

similar topic I also covered the

play00:29

interview prep questions of the other

play00:31

job skill set so might be that videos

play00:33

will be useful for you my primary

play00:35

objective behind this YouTube channel is

play00:37

to just give a value to my clients value

play00:40

to my stakeholders value to my

play00:42

subscribers so that they gain

play00:43

information from this particular Channel

play00:46

so without wasting your time let's start

play00:48

with the first part hello everyone my

play00:51

name is prabh Nair and I'm working as a

play00:53

chief instructor at infosectory

play00:55

[Music]

play01:09

foreign

play01:11

okay so we are starting with the first

play01:13

question can you tell me about what is

play01:15

privacy or can you tell me more about

play01:17

what is privacy see normally interview

play01:20

when they ask this question from the

play01:22

candidate they want to know the thought

play01:24

process of the candidate okay what he

play01:27

basically or what she perceive about

play01:28

privacy because it is very important to

play01:31

know the psychology of the candidate how

play01:33

he take on how how she take the Privacy

play01:36

as a subject okay because privacy is a

play01:39

very complex thing when it comes to

play01:40

their Solutions and all that it's a very

play01:41

complex thing so in most of the

play01:43

interviewers normally ask this question

play01:45

just to understand what is a visibility

play01:48

the candidate has about the privacy

play01:51

so if you uh going to answer this

play01:55

question or if I am going to answer this

play01:56

question this is the normal response I

play01:57

give to the question so privacy is a

play01:59

state of information

play02:01

in which one is not observed or

play02:05

disturbed by the other people example

play02:07

like my medical records so I have my

play02:10

medical records okay I want that

play02:13

information only with me so I have some

play02:16

medical informations okay I went for

play02:19

some test and this is my information and

play02:21

is basically associate with me only so I

play02:23

don't want this information

play02:25

should go outside to any third person

play02:29

because that is a state of information

play02:30

for me and I might get Disturbed if that

play02:33

information is available to third party

play02:35

because he might misuse that information

play02:37

for his personal benefit

play02:39

that is why in some countries privacy is

play02:42

a fundamental right okay and essential

play02:44

to the freedom and protection of human

play02:46

dignity and serving as a foundation upon

play02:48

which many other human human rights are

play02:51

basically built so this is how you can

play02:53

able to present the statement so if

play02:56

someone asks about what is privacy and

play02:57

why it is important it's a state of

play02:59

information which neither observed or

play03:01

disturbed by the other people and it is

play03:04

a fundamental rights in some countries

play03:06

which is considered as a human dignity

play03:08

and that is why in some countries we

play03:10

have a dedicated law which basically

play03:12

protect the privacy of an individual one

play03:16

more important thing sometime in the

play03:18

interview they also ask what is the

play03:19

difference between the privacy

play03:22

and secrecy

play03:25

so privacy is a state of information

play03:27

which deal with the individual

play03:30

and secrecy is a state of information

play03:32

which deal with the organization example

play03:34

company has their internal business

play03:36

informations they have their internal

play03:38

trade secrets so that is called as

play03:39

secret information and the information

play03:41

which is mapped with the individual that

play03:44

is basically called as a privacy

play03:46

okay so let's move to the next interview

play03:49

question

play03:50

okay next question is what is the most

play03:53

important requirement for a privacy

play03:55

compliance

play03:56

by asking this question interviewer want

play03:58

to know your experience in the data

play04:00

privacy area

play04:01

because you know they cannot hire any

play04:03

random consultant to manage a privacy

play04:05

because it is something related to their

play04:07

law regulations business requirement and

play04:09

all that so they want to know your

play04:11

experience they want to know your

play04:12

knowledge on that particular area

play04:15

so this is how I basically craft this

play04:17

question that's why we have raised this

play04:19

question what is the most important

play04:20

requirement for privacy compliance and

play04:22

as a client I will definitely ask this

play04:23

question from a candidate

play04:25

so answer is first understand the

play04:27

regulation business requirement because

play04:29

if you want to start building any kind

play04:31

of a privacy system in the organization

play04:33

we will definitely need to know okay

play04:36

what are the current requirement we have

play04:37

what is the business requirement we have

play04:39

let's take example I joined one

play04:42

European based company okay so this is

play04:44

the company we have company a

play04:47

so I joined this company so I need to

play04:49

make sure that okay a company should be

play04:52

comply with the gdpr

play04:55

or they have a customer in U.S so I need

play04:57

to be comply with uh HIPAA I need to be

play05:00

comply with glba or if I'm basically

play05:03

serving any kind of a customer in Canada

play05:05

I need to be comply with the people die

play05:07

and all that so first thing in order to

play05:09

comply comply is basically mean Act of

play05:12

abiding so in order to comply with gdpr

play05:15

comply with h a pi and all that I need

play05:17

to First understand the requirement

play05:19

simple logic now like if I'm if I'm

play05:20

going to someone's house I need to know

play05:22

the rules and regulation of the house

play05:23

right that is how I get the respect and

play05:26

that is how I get my Safety and Security

play05:27

same like as a company if I'm basically

play05:30

operating in a particular region I need

play05:32

to know the business requirement I need

play05:34

to know the regulated requirement of

play05:36

that particular region okay now if gdpr

play05:38

say that okay you need to process data

play05:40

in a pseudonymization so I need to make

play05:42

sure what are the data is processing in

play05:44

the EU it should be done in a

play05:45

studentization if glb is saying that

play05:48

tomorrow you need to keep the data

play05:49

address in encrypted order I will keep

play05:51

the data in encrypted order so before

play05:52

implementing the encryptions and all

play05:54

that I need to know what is the

play05:56

requirement

play05:57

so that is why that is the first step so

play05:59

when you're going to explain in this way

play06:00

you build the confidence in the

play06:02

intervaries this guy has a knowledge

play06:04

so Second Step appoint the data

play06:06

Protection Officer in some cases we need

play06:08

to have a data Protection Officer he is

play06:10

just act like a data Steward who

play06:12

understands the business requirement and

play06:14

map the business requirement with the

play06:15

legal requirements and he he or she will

play06:18

be the person who will basically talk

play06:19

about what is the requirement we need to

play06:21

be comply with the Privacy Okay the

play06:24

third most important thing we need to

play06:25

create a privacy program management

play06:27

because it include all the controls

play06:29

procedures and everything by which we

play06:31

basically maintain the Privacy

play06:32

protection and then we basically create

play06:35

a privacy policy which basically capture

play06:37

the intent of the management because if

play06:39

you want to enforce any kind of a

play06:41

privacy practices in the organization it

play06:43

need to be driven through a privacy

play06:45

policy and then finally we conduct the

play06:48

Privacy impact assessment which

play06:50

basically all about what is basically

play06:52

have and what we need to achieve so

play06:54

privacy impact assessment is just like a

play06:56

gap assessment to identify the level of

play06:58

privacy requirement we have in the

play07:00

process and what we currently have so

play07:02

this is how the process we follow by

play07:04

which we can able to compliance with any

play07:07

privacy requirement

play07:08

let's move to the next interview

play07:10

question

play07:12

okay next interview question is what is

play07:15

privacy

play07:16

program management

play07:19

frequent question asked in the exam see

play07:21

the way we creating a management system

play07:23

isms information security management

play07:25

system which basically talk about

play07:28

all the information security controls to

play07:30

protect the data and all that same like

play07:32

when we're building a privacy concept of

play07:34

privacy Engineering in the organization

play07:36

it has a set of controls

play07:38

okay and for that that set of controls

play07:41

are organized in one particular system

play07:43

and that system is called as a privacy

play07:45

program management so privacy program

play07:47

management is a frequent question which

play07:49

is you know uh ask in the jobs and all

play07:53

that so how you basically respond to

play07:54

that so it is basically a comprehensive

play07:56

approach to privacy and data protection

play07:58

that is essential for all agencies

play08:00

Enterprise and other organization that

play08:03

handles personal data and it minimize

play08:05

the risk of privacy breaches maximize

play08:07

the ability to address the underlying

play08:09

problems reducing the damage arising

play08:11

from a bridge so in a layman term like

play08:13

let's understand see privacy program is

play08:15

all about uh you can say it's all about

play08:18

establishing

play08:23

establishing

play08:30

implementing

play08:31

and

play08:35

continually improving an organization

play08:37

primary program to ensure we can

play08:40

basically compliance with the applicable

play08:41

data privacy regulations so the way we

play08:44

have isms information security

play08:45

management system which basically

play08:47

include all the controls and practices

play08:49

same like I want to comply with privacy

play08:51

regulation I want to comply with privacy

play08:53

requirement so how to do that so we

play08:55

basically build a system in which the

play08:57

policies are there controls are there

play08:58

and that that concept is basically

play09:01

called as a privacy program management

play09:03

now sometime what happened interviewer

play09:05

also asks what are the steps is

play09:07

basically required for Effective privacy

play09:09

program management so in that the first

play09:12

step is basically establish the Privacy

play09:14

program that is the first step

play09:19

establish the Privacy program okay

play09:22

where we establish the program that

play09:23

Define the organization approach to data

play09:25

privacy set out the policy procedures

play09:27

process for managing personal data then

play09:30

second step is basically we conduct the

play09:32

Pia

play09:34

privacy impact assessment or privacy

play09:36

risk assessment where we perform the

play09:37

risk assessment to identify the

play09:38

potential privacy risk to the

play09:40

organization personal data is process

play09:42

and then third step is basically called

play09:44

as a develop the Privacy management plan

play09:47

so this we develop the Privacy

play09:49

management plan that outline the

play09:50

organization strategy for mitigating

play09:52

privacy risk and compliance with the

play09:54

applicable data or any regulated

play09:57

requirement and this plan should include

play09:58

all the Privacy Control process and

play10:00

procedure so that is what privacy

play10:02

Management program is all about it

play10:03

include the controls that we need to

play10:05

apply include the processes and most

play10:08

important include the procedure and then

play10:10

once we create that the next thing what

play10:12

we have to do is we need to implement

play10:14

the

play10:15

privacy controls

play10:18

implement

play10:22

privacy control so implement the Privacy

play10:24

control is all about identifying the

play10:26

Privacy management plan and this include

play10:28

implementing technical control such as

play10:29

encryption access control and all that

play10:31

and once you basically implement the

play10:33

control the next thing we have to do the

play10:35

monitor

play10:37

monitor is basically all about

play10:38

monitoring the effectiveness of the plan

play10:40

including your privacy Control process

play10:42

to ensure you know ongoing compliance

play10:44

with applicable data privacy regulation

play10:46

we have then we need to have an instant

play10:48

response plan where we develop and

play10:49

implement the instant response plan to

play10:50

respond to the Privacy incidents and we

play10:52

need to train people on the

play10:55

privacy activity so somebody's

play10:57

established the Privacy program then

play10:59

conduct the Pia then develop the Privacy

play11:01

management system then implement the

play11:03

Privacy control then Monitor and then we

play11:05

have a train and review so this is how

play11:08

you basically build the Privacy

play11:09

management system in the organization so

play11:11

it includes a set of activities it

play11:13

include the set of controls process and

play11:15

procedure we talk about how to maintain

play11:17

the data privacy in the organization

play11:19

okay let's move to the next interview

play11:22

question as I said sometime interviewer

play11:24

trying to confuse you with the very

play11:26

basic questions because you should be

play11:27

good in Basics and this is what the

play11:30

basic question is what is the difference

play11:31

between the Privacy versus secrecy

play11:35

so privacy is a state of information

play11:37

that deal with the individual like your

play11:40

pii your health records WhatsApp chats

play11:43

and all that okay which is something led

play11:45

to your individual and secrecy is a

play11:47

state of information which deal with the

play11:49

Enterprise example like companies

play11:51

business process and all that so that is

play11:53

the Thin Line difference we have between

play11:54

the privacy and secrecy

play11:58

so let's move to the next interview

play12:00

question

play12:02

okay next question is what are the

play12:05

important steps required for a gdpr

play12:07

compliance now here I basically divided

play12:10

the response into two part one is very

play12:12

high level and one is basically detail

play12:14

level now sometime what happened

play12:16

interview basically asks this question a

play12:18

different way example we already have a

play12:19

compliance with other regulations but

play12:22

you know we don't want to repeat the

play12:24

same step so do you know any High

play12:26

critical steps that we can consider by

play12:27

which we can even directly comply with

play12:29

gdpr

play12:30

or you know what are the important

play12:32

critical steps are required to be comply

play12:33

with gdpr on a high level so this is

play12:36

basically where the interviewer test

play12:37

your experience they want to know your

play12:40

experience in the gdpr area

play12:42

so I have divided the response in two

play12:44

part one is very high level and one is

play12:45

very detailed level so high level is

play12:48

updating the individual data consent and

play12:51

disclosures normally current process we

play12:53

have which is compliance with Pip die

play12:54

and all that but according to gdpr we

play12:56

need to update the consents current

play12:58

policies privacy notices are compliant

play13:00

with bibda so we will update all the

play13:02

necessary requirement of jdpr and third

play13:04

is implement the transparency

play13:06

documentations okay whatever the

play13:07

critical documents are required to be

play13:09

comply with gdpr I am going to update

play13:10

instead of going from a scratch so that

play13:13

is basically a very high level steps but

play13:15

if you want to go in detail then I have

play13:17

also a step for that example like the

play13:19

first step is uh

play13:21

data mapping okay where we identify map

play13:24

all the personal data okay which we

play13:26

collect the process store including the

play13:30

category of data location you know the

play13:32

legal basis for processing it that is

play13:34

the first step then we basically create

play13:36

a privacy policy we need to develop and

play13:37

implement the privacy policy because

play13:39

privacy policy is a foundation of a

play13:42

privacy governance okay always remember

play13:44

any kind of a system program you want to

play13:46

introduce in the organization the first

play13:48

we need to create a policy for that so

play13:49

policy is a Law and Order of the company

play13:52

okay so develop and implement the policy

play13:54

that inform individual about how that

play13:56

data is collected how it's going to be

play13:58

processed and how it going to be shared

play14:01

then third important thing we need a

play14:03

consent management so where we need to

play14:05

establish the processes to obtain and

play14:07

manage the consent from the individual

play14:09

for collecting processing storing the

play14:11

personal data how you're going to

play14:12

process the data so that is required and

play14:14

then once we have all these things on

play14:16

that I need to identify the gaps and

play14:18

that is basically where the Pia come

play14:20

into the picture Pia is one of the most

play14:22

important part of the Privacy management

play14:25

system

play14:26

because it conduct the assessment like

play14:29

they identify the risk

play14:31

they mitigate the Privacy risk

play14:33

associated with the new project or

play14:34

changes in the existing process let's

play14:36

take an example uh where companies

play14:38

already compliance with other

play14:40

regulations and now uh

play14:42

this company is planning to onboard a

play14:45

new project from the EU

play14:47

so they will try to understand what are

play14:49

the requirement of this business

play14:52

okay what is current control we have and

play14:55

how we can basically comply on the gdpr

play14:57

so let's take example uh we we have a

play15:00

website which is basically collecting a

play15:02

set of information

play15:03

uh from the Canada

play15:06

and our website is complied with Canada

play15:07

now we are planning to launch this

play15:09

website in the Europe so I need to see

play15:10

what is a set of requirement we need in

play15:12

the website okay so that we can

play15:14

compliance with the gdpr

play15:16

okay so we identify the risk oh there's

play15:19

no consent mentioned there's no privacy

play15:21

notice mentioned this is how we did the

play15:22

Pia

play15:24

okay so user want HTTP so if I use HTTP

play15:27

there is an information disclosure so

play15:28

this is against the principle of gdpr so

play15:30

this is how I'm doing a Pia so if you

play15:32

give such kind of an examples it builds

play15:34

more confidence

play15:35

so Pia is the most important thing so

play15:38

once you it is done with the Pia the

play15:39

next step is basically data subject

play15:41

rights so data subject right is all

play15:43

about you know implement the process to

play15:45

manage the data subject rights including

play15:47

the how we access the data how here

play15:49

Rectify how he erase the data restrict

play15:52

the processing data portability all this

play15:53

thing need to be defined then we have a

play15:56

database notification in gdpr the

play15:58

mandated report breaching is 72 hours in

play16:00

72 hours you need to report the data

play16:02

breach so database notification we need

play16:05

to establish the process here

play16:07

to inform the individuals and all that

play16:09

sometime what happened we onboard the

play16:11

vendors also and we need to make sure

play16:12

the vendors also compliance with your

play16:14

privacy

play16:15

vendor should be compliant with gdpr

play16:16

because by end of the day you are the

play16:18

one who accountable for the regulatory

play16:19

so we need to implement the process to

play16:21

ensure the third party vendors

play16:23

compliance with the GDP requirement when

play16:25

processing the personal data on behalf

play16:27

of the organization

play16:28

then we have our training and awareness

play16:30

where we provide the regular trainings

play16:32

to the employees to ensure they are

play16:34

under GDP requirement and then we have a

play16:36

minimum appointment of data protection

play16:38

officers okay to oversee the gdpr

play16:40

compliance and they should be serve as a

play16:42

point of contact with supervised

play16:44

Authority and regularly audit and review

play16:46

just to make sure we are compliance with

play16:48

all the gdbr requirement

play16:50

so these are the detailed steps we have

play16:52

by which you can able to comply with the

play16:54

gdpr okay let's move to the next

play16:57

interview question

play16:59

okay how are you responding to the

play17:02

Privacy breach privacy breach it means

play17:04

it's up to more any breach happen how

play17:05

are you going to respond to the breach

play17:06

because here the interview want to know

play17:08

your psychology of how you handle the

play17:11

crisis

play17:12

okay how good you are in handling the

play17:14

crisis because fail to comply with

play17:16

privacy or if there is a privacy breach

play17:18

you need to face a Regulatory Compliance

play17:21

penalties and all that so here one

play17:22

interview want to know how you basically

play17:24

handle such kind of a situation

play17:26

so how are you responding to the Privacy

play17:28

brief so first is contain the bridge

play17:30

contain these example if system is

play17:31

infected with the virus isolate a system

play17:34

immediately from the network that is my

play17:35

first priority instead of doing start

play17:37

doing a troubleshooting there itself so

play17:39

example like we have a server here

play17:43

okay and this servers are basically

play17:44

connected with the other servers so the

play17:47

hacker

play17:49

example like

play17:51

hacker hack into the server and able to

play17:54

access the data but I don't want further

play17:55

damage so isolate a system from the

play17:57

network that is the first thing and for

play17:58

that I will first notify the instant

play18:00

response team and they will basically

play18:02

isolate a system immediately from the

play18:04

network and then we do the further

play18:06

investigation how they hack the system

play18:07

so that is called as I contain the

play18:09

breach contain the breach it mean limit

play18:11

the breach second is we will evaluate

play18:14

the risk associated with this bridge

play18:15

okay what is the level of affected

play18:17

things we have so example 20 of a data

play18:20

got compromised so at least we save 80

play18:22

of our data here so we evaluate the risk

play18:24

associated with the beach okay then

play18:26

according to gdpr I need to report the

play18:28

breach so I will see the what is the

play18:30

notification requirement we have I will

play18:32

basically get it done the plan PR team

play18:35

will be involved how to craft a message

play18:36

and then we basically proceed with the

play18:39

remediation lesson line remediation

play18:40

lesson learn make sure this incident

play18:42

should not be repeated again in the

play18:44

future so that is how we basically do

play18:46

the problem management root cause

play18:47

analysis and all that so that is how I'm

play18:49

going to respond to the breach

play18:53

okay next interview question

play18:56

very good question how to create a

play18:57

privacy policy here the interviewer how

play19:00

to create a privacy policy here the

play19:02

interviewer want to know whether you are

play19:03

good in writing and all that you you

play19:05

have a good understanding of governance

play19:07

and all that so the first step whenever

play19:10

you're creating a policy is to

play19:11

understand the business and legal

play19:12

requirement one thing you need to

play19:14

understand privacy is a foundation of

play19:15

any governance okay

play19:18

management intentions are covered in the

play19:20

policies okay so example every system

play19:22

must be protected with the password so

play19:24

this is the statement come from the

play19:26

management

play19:27

so that is a policy so whenever you want

play19:30

to build a privacy governance privacy

play19:31

management privacy policy is a mandatory

play19:34

step because it is created by the

play19:35

Protection Officer and approved by the

play19:37

Senior Management and whenever you're

play19:39

creating a policy make sure a policy

play19:41

capture all the business and legal

play19:43

requirement that is a most important and

play19:45

must as a category

play19:46

then second is Define the scope and

play19:49

statement okay like this policy is

play19:51

basically applicable for which country

play19:53

or policy application for which branch

play19:55

or policy application for which business

play19:56

process so example like we are the

play19:58

multinational company where we have a

play20:01

project from Canada we have a project

play20:02

from us so according to us we need to

play20:04

create a privacy policy for a U.S

play20:06

process we need to create a privacy

play20:08

policy for the gdpr we need to create a

play20:10

privacy policy for pipda so we need to

play20:12

Define here is this policy applicable

play20:14

for which particular area so that is why

play20:16

the scoping is very important otherwise

play20:18

it is difficult for the people to follow

play20:21

it is very important to include your

play20:23

business names and contact information

play20:24

so if someone if tomorrow someone is

play20:26

confused with the policies and all that

play20:27

there should be a point of contact that

play20:30

the person can reach out

play20:31

mention about what type of information

play20:33

you're going to collect so the policy it

play20:35

is very important Define what type of

play20:37

information you collect

play20:38

okay that's the most important thing

play20:40

okay there are many different way we

play20:41

collect the user information example

play20:43

like contact form cookie survey course

play20:45

registrations you know email newsletters

play20:47

so this is something we need to Define

play20:50

need to address how you're going to

play20:52

collect and why so it's very important

play20:54

Define the procedures okay because it

play20:57

gives the clarity but why we need that

play20:59

and last need to Define if user data is

play21:01

shared with a third party if yes mention

play21:03

that and last but not the least for how

play21:05

long you want to collect the data

play21:07

because by this is how you can able to

play21:08

limit your liability because you have

play21:11

collected data and you're keeping the

play21:12

data in the database and tomorrow it got

play21:14

hacked then you are answerable for that

play21:17

so Define the retention period for how

play21:19

long you're keeping the data okay so by

play21:21

this way you can able to limit your

play21:23

liabilities okay because we have a one

play21:25

simple fundamental is the best way to

play21:27

protect yourself from any kind of a

play21:29

compliance issue is limit in the

play21:31

collection of a data okay let's move to

play21:33

the next interview question before

play21:36

moving that there is one more important

play21:37

thing policy need to be reviewed

play21:39

annually or in the case of major change

play21:41

in the business and policy when it

play21:43

reviewed annually it need to be reviewed

play21:45

with the version update so in the last

play21:47

page there is called as a version update

play21:48

like policy was revised on this

play21:50

particular date and this is the version

play21:51

information okay we also need to add the

play21:54

policy exception process example

play21:55

sometime things are goes against the

play21:57

policies or sometimes we have to drive

play21:59

some activity against the policy so we

play22:01

need an exception approvals and that

play22:03

also need to be tracked down and later

play22:05

on annually we'll see how many time this

play22:07

kind of an exception has been generated

play22:08

and if it is basically generated

play22:10

multiple times try to amend that in a

play22:13

policies okay

play22:15

now next thing is next interview

play22:17

question is

play22:20

what is your understanding of data

play22:21

privacy and why is it important in today

play22:24

World sometimes the interview want to

play22:26

know your psychology behind the data

play22:27

privacy

play22:29

okay because it is very important until

play22:31

now you don't have that state of mind

play22:35

to understand the Privacy you cannot

play22:36

able to implement the control

play22:38

that is why my first question was also

play22:40

on the data privacy introduction

play22:42

so how you basically respond to that see

play22:43

when you're talking about your response

play22:46

is very simple so data privacy first of

play22:48

all you give the definition like data

play22:49

privacy refer to the protection of

play22:50

personal information from unauthorized

play22:52

access use disclosure and then you can

play22:56

add some narratives here like in today

play22:58

world where the personal information is

play22:59

frequently collected shared process data

play23:02

privacy is critical to ensure that you

play23:04

know individual retain control over

play23:06

their personal data and are protected

play23:08

from the potential harm so this is how

play23:09

you can basically start the statement

play23:12

then you can give your observation like

play23:15

why data privacy is important in today

play23:17

world is first personal data can be used

play23:20

for nefarious purpose right

play23:22

such as identity theft Financial broad

play23:25

or staking that's why it's very

play23:27

important to have a data privacy second

play23:29

is personal data can be sold to third

play23:30

party who may use it for Target

play23:32

individual that is what we need to

play23:33

protect and third personal data can be

play23:35

used to make the decision about

play23:36

individuals such as whether they are

play23:38

eligible for the loans insurance and all

play23:40

that okay so overall data privacy is

play23:42

essential to protect the individual

play23:44

right maintaining trust in the

play23:46

institutions and business that collect

play23:48

the personal information and ensure the

play23:50

personal data is used ethically and

play23:51

reasonably so when you give this kind of

play23:52

a narrative answer I'm sure it build the

play23:54

confidence in the job

play23:57

so sometime what happened the

play23:58

interviewer also asks your experience on

play24:01

the data privacy risk assessment okay

play24:04

because sometime what happened whatever

play24:06

mentioned in the book is different from

play24:07

what is happening in the industry okay

play24:09

so they will ask you sometime like can

play24:11

you walk me through your approach to

play24:12

performing a data privacy risk

play24:14

assessment so how you start certainly

play24:16

here is a general approach to perform

play24:18

the data private series assessment the

play24:20

first is identify the scope and purpose

play24:22

of assessment

play24:23

the first step in data privacy risk

play24:25

assessment is to clearly Define the

play24:26

scope okay the purpose of assessment and

play24:29

this includes identifying the system

play24:31

applications data that will include in

play24:34

the assessment as well as objective of

play24:36

the assessment second is we need to

play24:38

identify the personal data definitely

play24:40

what data we have we need to assess

play24:42

okay which include analyzing a

play24:43

sensitivity of a data potential impact

play24:45

of a data breach unauthorized disclosure

play24:47

third evaluating the existing control

play24:49

that's another important thing where

play24:51

we're reviewing the existing policy

play24:53

procedure technical controls do they are

play24:55

educate then the next thing is identify

play24:57

the gaps what we have and what we need

play24:59

to achieve okay so based on assessment

play25:02

results we identify Gap in the current

play25:03

controls like example I did the

play25:05

assessment of the website I discovered

play25:06

they are using SSL required is TLS okay

play25:10

there's no multi-factor authentication

play25:11

required multifact authentication so

play25:13

that is how I identify gaps because a

play25:16

good privacy consultant doesn't mean

play25:17

okay start from scratch when we already

play25:19

have some control we need to just

play25:20

enhance those control and that is how

play25:22

you can able to save the budget also so

play25:24

identify gaps

play25:26

and prioritize the remediations is it

play25:28

clear and then based on that develop the

play25:31

action plan so when I say develop an

play25:33

action plan it outlined the remediation

play25:35

actions timeline responsibilities that

play25:37

is the most important thing okay and

play25:40

then finally we have a monitor and

play25:42

review where we basically monitor the

play25:44

current control in place so this this

play25:46

approach can be tailored to meet the

play25:47

specific need and requirement of

play25:49

organization that applicable to the data

play25:51

privacy regulation so this is all from

play25:54

my side do let me know shall we make

play25:56

more coffee shots or interview questions

play25:57

on data privacy shall I make some coffee

play26:00

shots on cip-pci pm and how do you find

play26:03

this video do share your feedback in a

play26:05

comment section because I really put my

play26:07

lot of hard work making this content and

play26:09

if you find this video useful and if you

play26:12

think this video can be

play26:14

useful for your friends and all that do

play26:16

share in your network and do subscribe

play26:19

to my channel and click on the Bell icon

play26:21

to make sure you should not miss my

play26:22

future videos on a similar topic thank

play26:24

you so much bye

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
Data PrivacyInterview TipsComplianceGDPRRegulationsInformation SecurityPrivacy PolicyRisk AssessmentCybersecurityProfessional Development